Extortionists employing telephony-denial-of-service attacks - a close relative to distributed-denial-of-service attacks - are targeting emergency communications centers that dispatch first responders.
The FTC puts the onus on application developers to protect their organization's sensitive data by mandating the use of "reasonable" data security practices. What does this mandate mean in practice?
Most cloud security discussions have focused on what cloud providers can do, what they can't do and what they might do if you pay them enough. These discussions focus on topics such as virtualization, hosting and data storage. However, just as the software industry has learned that putting fancy boxes on the
network...
The prevalent approach to security management and operations is to implement on an ad hoc and technology-focused basis. This haphazard approach is no longer adequate.
This report details:
The current state of the market and what to expect moving forward;
Research implications for technology vendors;
Research...
As part of the software development process, security professionals must make choices about where to invest their budget and staff resources to ensure that homegrown applications are as secure as possible.
This research brief details:
Best practices for all organizations that would like to produce more secure...
The fact is that the world is constantly evolving and always connected - and your enterprise must be too. Forward-thinking enterprises realize that they need to focus on a sustainable approach to security and risk management - one that is designed to address the new wave of vulnerabilities that prevail due to...
Every enterprise has high-value information that is vital to its success. As cyber-attack techniques become more sophisticated your "digital gold" is increasingly vulnerable. Today's cyber threats have changed in sophistication, in focus, and in their potential impact on your business.
Download this eBook to...
American Express confirms it was hit this week by a distributed-denial-of-service attack. The hacktivist group that has targeted banks in recent months claims credit for this latest high-profile attack.
Attacks against Facebook, Twitter and other organizations over the past few months should send a message to business owners that they need to better fund cybersecurity, IT security expert Mischel Kwon says.
Was the Spamhaus DDoS incident truly the "biggest cyber-attack in history," as some media outlets dubbed it? And what relation - if any - does it have to DDoS attacks on U.S. banking institutions?
What are the common mistakes individuals in organizations make when it comes to data security and breaches? Craig Spiezle of the Online Trust Alliance provides insight from the latest research.
The bad guys who attack information systems are getting better at what they do, making old threats even more dangerous, says Steve Durbin of the Information Security Forum.
TD Bank and Keybank confirm that their online-banking sites were hit by DDoS strikes last week. And one security expert says other banks were hit by sophisticated attacks as well.
What's the cost to an organization when it suffers a seurity breach and breaks trust with its own customers? Jeff Hudson, CEO of Venafi, presents results of a new survey on the cost of failed trust.
Venafi has just partnered with Ponemon Group to release a new survey, "The Cost of Failed Trust". Among the key...
What can organizations do to improve security after a network attack? Post-breach investigations help security leaders trace steps and strengthen weak points, says investigator Erin Nealy Cox.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.